Authors
Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić
Publication date
2011
Conference
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings 17
Pages
270-287
Publisher
Springer Berlin Heidelberg
Description
In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of 64 steps with practical complexity. We have implemented the attack and provide an example. Our results suggest that the security margin of SHA-256 is much lower than the security margin of most of the SHA-3 finalists in this setting. The techniques employed in this attack are based on a rectangle/boomerang approach and cover advanced search algorithms for good characteristics and message modification techniques. Our analysis also exposes flaws in all of the previously published related-key rectangle attacks on the SHACAL-2 block cipher, which is based on SHA-256. We provide valid rectangles for 48 steps of SHACAL-2.
Total citations
2010201120122013201420152016201720182019202020212022202320241181246612485242
Scholar articles
A Biryukov, M Lamberger, F Mendel, I Nikolić - Advances in Cryptology–ASIACRYPT 2011: 17th …, 2011